MDIS Blog

Main Menu

MENUMENU
  • Business & Management
  • Engineering
  • Fashion & Design
  • Life Sciences
  • Media & Communications
  • Psychology
  • Information Technology
  • Tourism & Hospitality
  • Nursing
  • Languages
  • College
  • Events
  • MDC
  • + Become A Contributor

logo

Header Banner

MDIS Blog

MENUMENU
  • Business & Management
  • Engineering
  • Fashion & Design
  • Life Sciences
  • Media & Communications
  • Psychology
  • Information Technology
  • Tourism & Hospitality
  • Nursing
  • Languages
  • College
  • Events
  • MDC
Information Technology
Home›Information Technology›Penetration testing to identify attacks in enterprise computer systems and networks

Penetration testing to identify attacks in enterprise computer systems and networks

By MDIS
20th November 2019
257
0
Share:

Penetration testing or pen test is defined as the simulation of a real-world attack on a target network or application through a wide range of activities. Penetration testing process is held by the auditor of the network or by a designated pen-tester. In technical terms, a pen-test is a methodical system to probe the present system from inbound and outbound corners, to determine the potential vulnerabilities. The system, in this context may refer to a union of hosts or network and/or applications involved in the industry infrastructure.

Pen-testing is not only concerned about technical and machine flaws, but also physical security loopholes and operating system flaws. By using proper pen-testing tools in various phases, with the help of authorised IT professionals, we can prevent cyber-attacks and up the ante of cyber security.

Let’s explore three main pen-testing phases and the tools involved:

Pre-attack phase

In conclusion, penetration testing is a crucial process to protect enterprise systems and network. It should be carefully implemented by using various tools and techniques to achieve a high level of security. Most enterprises understand the use of penetration testing and hire cyber security professionals to prevent their systems and network from malicious attacks. With continuous efforts in fortifying enterprise systems and networks, attacks can be minimised and proper counter measures can be devised and implemented.

Attack phase

This second step in the process is essential for any penetration testing process. It consists of endangering the target with the use of offensive tools. These tools for target probing include social engineering (a broad range of malicious activities accomplished through human interactions), vulnerability test scans, password crackers, wire shark, nessus, burpsuite, meta sploit and NMap. All these are software tools to perform malicious attacks. Once these tools are activated, the first step is to acquire the required privileges, by exploiting the victim and implanting the software to hijack the system. The main purpose of this phase is to maximise the exploitation of the system’s defenses’ flaws.

Post-attack phase

The main aim of this last step is to remove or erase any files or logs, that may point to the activity of the penetration tester. It happens only after the organisation’s network has been exploited and performs a set of actions, that restores the system to its original state. More specifically, it involves actions such as erasing implanted backdoors, cleaning the registry entries, restoring the network devices configuration and removing any connections that were previously made during the attack phase.

In conclusion, penetration testing is a crucial process to protect enterprise systems and network. It should be carefully implemented by using various tools and techniques to achieve a high level of security. Most enterprises understand the use of penetration testing and hire cyber security professionals to prevent their systems and network from malicious attacks. With continuous efforts in fortifying enterprise systems and networks, attacks can be minimised and proper counter measures can be devised and implemented.

This article is written by Latha Manian from the School of Technology.

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0

MDIS

Think Success. Think MDIS.

Related articles More from author

  • XBox One X
    Featured BK GridInformation Technology

    Xbox One X Review

    9th January 2018
    By MDIS
  • Internet thing
    Featured Full Width SliderInformation Technology

    What if people could connect with objects too?

    9th September 2017
    By MDIS
  • Information Technology

    Cybersecurity

    28th August 2019
    By MDIS
  • Featured BK GridFeatured Full Width SliderInformation Technology

    Cloud Enabled Content Management for Digital Signage

    17th August 2018
    By MDIS
  • SOT
    Featured BK VideoInformation Technology

    MDIS School of Technology

    24th January 2018
    By MDIS
  • Information Technology

    Artificial Intelligence (AI): What’s the Buzz?

    17th May 2019
    By MDIS

Leave a Comment Cancel reply

You may also like

  • Events

    Basketball Alumni Reunion

  • Information Technology

    Technology innovation using Virtualisation and Virtual Machine

  • 3D Printing
    Engineering

    3D Printing: An introduction

Categories

  • Business & Management (16)
  • Career Management (13)
  • College (14)
  • Engineering (5)
  • Events (20)
  • Fashion & Design (20)
  • Featured BK Grid (60)
  • Featured BK Row (46)
  • Featured BK Video (8)
  • Featured Full Width Slider (47)
  • Information Technology (17)
  • Languages (12)
  • Life Sciences (12)
  • Lifestyle (1)
  • MDC (8)
  • Media & Communications (21)
  • Nursing (3)
  • Psychology (5)
  • Safety Management (1)
  • Tourism & Hospitality (16)
  • Uncategorized (3)
  • Popular

  • Comments

  • MDIS Immersion programmes

    MDIS Immersion programmes

    By MDIS
    30th April 2018
  • POA-MDIS Campus

    Beyond the Classroom: Commerce – Principles of Accounts

    By Gayathrii Nathan
    21st September 2018
  • Machine

    What is Machine Learning?

    By MDIS
    26th June 2018
  • Edmund
    on
    4th September 2019

    Beyond the Classroom: Commerce – Principles of Accounts

    I didn't fully appreciate ...
  • on
    31st July 2019

    MDIS Immersion programmes

    Good morning sir, I'd ...
  • nbyitsolution
    on
    3rd March 2019

    3D Printing

    Thanks for posting 3d ...

Error: Access Token is not valid or has expired. Feed will not update.
This error message is only visible to WordPress admins

There's an issue with the Instagram Access Token that you are using. Please obtain a new Access Token on the plugin's Settings page.
If you continue to have an issue with your Access Token then please see this FAQ for more information.

Follow us on Instagram

Archive

  • 6th December 2019

    Honing communication skills

  • 29th November 2019

    Are we compromising our free will?

  • 20th November 2019

    Penetration testing to identify attacks in enterprise computer systems and networks

  • 7th November 2019

    Filmmaking Scene in Singapore

  • 30th October 2019

    3 Simple Methods to Upcycle T-shirts!

Subscribe to Our Blog

Name *

Email *

TAGS

  • adventure cove
  • MDIS
  • MDIS Business School
  • sentosa
  • career opportunities
  • millennials
  • studentvolunteers
  • dace workshop
  • fashion
  • MDIS School of Media and Communications
  • life science
  • Artificial intelligence
  • technology
  • MDIS School of Technology
  • fashionanddesign
  • bioaccumulation
  • purpleparade
  • biomagnification
  • MBA
  • littoral zone
  • academic talks
  • dance club
  • national park board
  • basketball
  • specialneeds
  • MDIS School of Fashion and Design
  • Glutathione
  • hypervisor
  • fashion industry
  • software computer
THINK SUCCESS. THINK MDIS.
Copyright© 2018. MDIS Blog. All Rights Reserved.
      
Where lifelong learning begins